cyberstruggle / chalumeauView external linksLinks
Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.
☆103Jul 26, 2020Updated 5 years ago
Alternatives and similar repositories for chalumeau
Users that are interested in chalumeau are comparing it to the libraries listed below
Sorting:
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Jan 19, 2026Updated 3 weeks ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Hide cool stuff in images :)☆145Aug 9, 2020Updated 5 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆492Jul 23, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Nov 8, 2020Updated 5 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆316Dec 19, 2023Updated 2 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Aug 14, 2024Updated last year
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Feb 12, 2023Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 5 years ago
- Source for tasks I have used with Covenant☆122Mar 21, 2021Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- Retrieve LAPS password from LDAP☆433Feb 17, 2021Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- ☆334Dec 8, 2022Updated 3 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆244Dec 10, 2020Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- ☆13Nov 24, 2019Updated 6 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago